Strongest protection. Simple licensing.
Sophos Endpoint delivers unparalleled defense against advanced cyberattacks on your endpoints and servers.
- Sophos Endpoint Detection and Response (EDR) elevates your endpoint defenses by enabling you to identify, investigate, and neutralize evasive threats.
 - Sophos Extended Detection and Response (XDR) extends EDR to provide visibility across your entire attack surface.
 - Organizations with limited in-house resources can engage Sophos’ Managed Detection and Response (MDR) services, delivered by a team of global cybersecurity experts that monitor your environment for threats 24/7.
 
Sophos Endpoint System Requirements:
Protect your iOS and Android devices with Sophos Mobile. 
Windows Server and Linux devices require a subscription to Sophos Workload Protection.
Sophos Endpoint for Legacy Platforms add-on available for critical systems running older operating systems.
| 
                
                 Sophos Endpoint Endpoint protection and control  | 
			  
                
                 Sophos EDR Complete endpoint protection, detection and response 
  | 
            
           Sophos XDR Comprehensive detection and response across the environment 
  | 
            
           Sophos MDR 24/7 expert-led threat monitoring and response service 
  | 
            ||
|---|---|---|---|---|---|
                
				Endpoint protection and control | 
        |||||
| THREAT SURFACE REDUCTION | |||||
| Web Protection | 
                 
                 
                 | 
        ||||
| Web Control | 
                 
                 
                 | 
        ||||
| Download Reputation | 
                 
                 | 
        ||||
| Application Control | 
                 
                 
                 | 
        ||||
| Peripheral Control | 
                 
                 
                 | 
        ||||
| Data Loss Prevention | 
                 
                 | 
        ||||
| Server Lockdown (application whitelisting) | 
                 
                 | 
        ||||
| Full Disk Encryption | 
                 Add-on  |          
                 Add-on  | 
            
                 Add-on  | 
            
                 Add-on  | 
            
                 
                 
                 | 
        
| THREAT PREVENTION | |||||
| Ransomware file protection (CryptoGuard) | 
                 
                 
                 | 
        ||||
| 
                Remote ransomware protection (CryptoGuard) Watch video  | 
            
                 
                 | 
        ||||
| Ransomware Master Boot Record (MBR) protection | 
                 
                 | 
        ||||
| 
                Context-sensitive Defense:  Adaptive Attack Protection Watch video  | 
            
                 
                 | 
        ||||
| 
                Context-sensitive Defense:  Estate-wide Critical Attack Warnings  | 
            
                 
                 | 
        ||||
| Deep Learning AI-powered malware prevention | 
                 
                 
                 | 
        ||||
| Anti-malware file scanning | 
                 
                 
                 
                 | 
        ||||
| Potentially Unwanted App (PUA) blocking | 
                 
                 
                 
                 | 
        ||||
| Live Protection cloud-lookups | 
                 
                 
                 
                 | 
        ||||
| Behavioral Analysis | 
                 
                 
                 | 
        ||||
| Anti-Exploitation (60+ mitigations) | 
                 
                 | 
        ||||
| Application Lockdown | 
                 
                 | 
        ||||
| Anti-malware Scan Interface (AMSI) | 
                 
                 | 
        ||||
| Malicious Traffic Detection | 
                 
                 
                 | 
        ||||
| Intrusion Prevention System (IPS) | 
                 
                 | 
        ||||
| File Integrity Monitoring (Servers) | 
                 
                 | 
        ||||
| Integrated ZTNA agent | 
                 
                 
                 | 
        ||||
| 
                
                 Sophos Endpoint Endpoint protection and control  | 
			  
                
                 Sophos EDR Complete endpoint protection, detection and response 
  | 
            
           Sophos XDR Comprehensive detection and response across the environment 
  | 
            
           Sophos MDR 24/7 expert-led threat monitoring and response service 
  | 
            ||
|---|---|---|---|---|---|
               
Detection, investigation and response | 
        |||||
| DETECTION | |||||
| Rich on-device data for real-time insights | 
                 —  | 
            
                   
                 | 
        |||
| Suspicious event detections | 
                 —  |  ||||
| AI-powered prioritization of detections | 
                 —  |  
                 
                 
                 | 
        |||
| Automatic MITRE Framework mapping | 
                 —  |  
                 
                 
                 | 
        |||
| Linux container behavioral and exploit detections | 
                 —  |  
				 
                 | 
        |||
| Device Exposure | 
                 —  |  
				 
                 | 
        |||
| Generate detections on integrated third-party data | 
                 —  |  
                 —  | 
            |||
| Cross-product event correlation and analysis | 
                 —  |  
                 —  | 
            |||
| INVESTIGATION | |||||
| RCA threat graphs | 
                 
                 
                 | 
        ||||
| Automatic and manual case creation | 
                 —  |  
                 
                 
                 | 
        |||
| On-demand Sophos X-Ops threat intelligence | 
                 —  | 
            
                 
                 | 
        |||
| AI Case Summary | 
                 —  |  ||||
| AI Command Analysis | 
                 —  |  ||||
| AI Search | 
                 —  |  ||||
| AI Assistant | 
                 —  |  
                 —  | 
            |||
| Forensic data export | 
                 —  | 
                 —  | 
            
                 
                 | 
        ||
| RESPONSE | |||||
| Automatic malware cleanup | 
                 
                 
                 
                 | 
        ||||
| Automatic ransomware file encryption roll-back | 
                 
                 
                 | 
        ||||
| Automatic process termination | 
                 
                 
                 | 
        ||||
| Synchronized Security: Automatic device isolation via Sophos Firewall | 
                 
                 
                 | 
        ||||
| On-demand Adaptive Attack Protection | 
                 —  |   
                 
                 | 
        |||
| On-demand device isolation | 
                 —  |   
                 
                 
                 | 
        |||
| Live Response remote terminal access | 
                 —  |   
                 
                 
                 
                 | 
        |||
| Microsoft 365 response actions | 
                 —  | 
                 —  | 
            
                 
                 | 
        ||
| DATA INGESTION | |||||
| Extensive data on-device and in the cloud (Sophos Products) | |||||
| Cloud data retention | 
                 —  |  
                 30 days  | 
            
                 90 days  | 
            
                 90 days  | 
            
                 
                 
                 
                 | 
        
| Additional cloud storage retention | 
                 —  |    
                 1 Year (Add-on)  | 
            
                 1 Year (Add-on)  | 
            
                 1 Year (Add-on)  | 
            
                 
                 
                 
                 | 
        
| Ingest and correlate data from your existing (non-Sophos) technology investments | 
                 —  | 
                 —  | 
            |||
| 
                
                 Sophos Endpoint Endpoint protection and control  | 
			  
                
                 Sophos EDR Complete endpoint protection, detection and response 
  | 
            
           Sophos XDR Comprehensive detection and response across the environment 
  | 
            
           Sophos MDR 24/7 expert-led threat monitoring and response service 
  | 
            ||
|---|---|---|---|---|---|
               
				24/7 managed detection and response service | 
        |||||
| 24/7 threat monitoring and response | 
                 —  |   
                 —  | 
            
                 —  | 
            ||
| Weekly and monthly reporting | 
                 —  |  
                 —  | 
            
                 —  | 
            ||
| Health Check | 
                 —  | 
                 —  | 
            
                 —  | 
            ||
| Expert-led threat hunting | 
                 —  |    
                 —  | 
            
                 —  | 
            ||
| Threat containment | 
                 —  |   
                 —  | 
            
                 —  | 
            ||
| Direct call-in support during active incidents | 
                 —  |  
                 —  | 
            
                 —  | 
            ||
| Full-scale incident response: threats are fully eliminated | 
                 —  |  
                 —  | 
            
                 —  | 
            ||
| Root cause analysis | 
                 —  |  
                 —  | 
            
                 —  | 
            ||
| Dedicated Incident Response Lead | 
                 —  |   
                 —  | 
            
                 —  | 
            ||
| $1M Breach Protection Warranty | 
                 —  |   
                 —  | 
            
                 —  | 
            ||
| Guided threat insights from Sophos X-Ops | 
                 —  |   
                 —  | 
            
                 —  | 
            ||
| 
                
                 Sophos Endpoint Endpoint protection and control  | 
			  
                
                 Sophos EDR Complete endpoint protection, detection and response 
  | 
            
           Sophos XDR Comprehensive detection and response across the environment 
  | 
            
           Sophos MDR 24/7 expert-led threat monitoring and response service 
  | 
            ||
|---|---|---|---|---|---|
                Optional add-ons | 
        |||||
| Sophos Endpoint for Legacy Platforms | 
                 Optional  |  
                  Optional  | 
            
                  Optional  | 
            
                 Optional  | 
            |
| Sophos Device Encryption | 
                 Optional  |  
                 Optional  | 
            
                 Optional  | 
            
                 Optional  | 
            |
| Sophos Advisory Services | 
                  Optional  |  
                 Optional  | 
            
                 Optional  | 
            
                 Optional  | 
            |
| Sophos Incident Response (IR) Services Retainer | 
                  Optional  |  
                 Optional  | 
            
                 Optional  | 
            
                 Optional  | 
            |
| Additional cloud storage retention | 
                  —  |  
                  Optional  | 
            
                 Optional  | 
            
                 Optional  | 
            |
| Sophos Identity Threat Detection and Response (ITDR) | 
                 —  |  
                  —  | 
            
                 Optional  | 
            
                 Optional  | 
            |
| Sophos Network Detection and Response (NDR) | 
                 —  |  
                 —  | 
            
                  Optional  | 
            
                Optional  | 
            |
| Sophos Managed Risk powered by Tenable | 
                 —  |  
                 —  | 
            
                  —  | 
            
                 Optional  | 
            |
  


